A hybrid intrusion detection and visualization system

J. Peng, C. Feng, J. W. Rozenblit

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Abstract

Network attacks have become the fundamental threat to today's largely interconnected computer systems, Unauthorized activities and unauthorized access account for a large proportion of these networks. Unauthorized accesses and misuse of critical data can be catastrophic to businesses, emergency services, and even threaten the defense and security of a nation. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilities. This paper proposes a hybrid intrusion detection and visualization system that leverages the advantages of current signature-based and anomaly detection methods. The hybrid instruction detection system deploys these two methods in a two-staged manner to identify both known and novel attacks. When intrusion is detected, autonomous agents that reside on the system will automatically take actions against misuse and abuse of computer system, thus protecting the system from internal and external attacks.

Original languageEnglish (US)
Title of host publicationProceedings - 13th Annual IEEE International Symposium and Workshop on Engineering of Computer Based Systems, ECBS 2006
Pages505-506
Number of pages2
DOIs
StatePublished - 2006
Event13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems, ECBS 2006 - Potsdam, Germany
Duration: Mar 27 2006Mar 30 2006

Publication series

NameProceedings of the International Symposium and Workshop on Engineering of Computer Based Systems

Other

Other13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems, ECBS 2006
Country/TerritoryGermany
CityPotsdam
Period3/27/063/30/06

ASJC Scopus subject areas

  • Hardware and Architecture
  • Software

Fingerprint

Dive into the research topics of 'A hybrid intrusion detection and visualization system'. Together they form a unique fingerprint.

Cite this